Sciweavers

2187 search results - page 8 / 438
» Providing Security Services in a Resource Discovery System
Sort
View
ESWS
2009
Springer
15 years 6 months ago
Middleware for Automated Implementation of Security Protocols
We propose a middleware for automated implementation of security protocols for Web services. The proposed middleware consists of two main layers: the communication layer and the se...
Béla Genge, Piroska Haller
ICNP
2000
IEEE
15 years 4 months ago
Dynamic Internet Overlay Deployment and Management Using the X-Bone
The X-Bone dynamically deploys and manages Internet overlays to reduce con®guration e€ort and increase network component sharing. The X-Bone discovers, con®gures, and monitors ...
Joseph D. Touch
MIDDLEWARE
2005
Springer
15 years 5 months ago
INDISS: Interoperable Discovery System for Networked Services
Abstract. The emergence of handheld devices associated with wireless technologies has introduced new challenges for middleware. First, mobility is becoming a key characteristic; mo...
Yérom-David Bromberg, Valérie Issarn...
164
Voted
AICT
2010
IEEE
240views Communications» more  AICT 2010»
14 years 3 months ago
Providing Security in 4G Systems: Unveiling the Challenges
— Several research groups are working on designing new security architectures for 4G networks such as Hokey and Y-Comm. Since designing an efficient security module requires a cl...
Mahdi Aiash, Glenford E. Mapp, Aboubaker Lasebae, ...
124
Voted
ESORICS
2002
Springer
15 years 11 months ago
TINMAN: A Resource Bound Security Checking System for Mobile Code
Resource security pertains to the prevention of unauthorized usage of system resources that may not directly cause corruption or leakage of information. A common breach of resource...
Aloysius K. Mok, Weijiang Yu